Security BSides (commonly referred to as BSides) is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack...
6 KB (419 words) - 12:51, 7 April 2025
Christopher Hadnagy (category Social engineering (security))
2025-05-31. "Security BSides Response to the BSides Cleveland Incident". Security Bsides. June 20, 2022. Retrieved June 23, 2022. "Security BSides commits...
11 KB (911 words) - 19:04, 11 June 2025
security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security....
220 KB (22,314 words) - 10:38, 16 June 2025
A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration...
18 KB (1,870 words) - 03:36, 6 June 2025
Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect...
53 KB (6,671 words) - 06:52, 7 April 2025
A security hacker or security researcher is someone who explores methods for breaching or bypassing defenses and exploiting weaknesses in a computer system...
55 KB (5,962 words) - 03:26, 11 June 2025
insecure and continued to operate. Because of the site's lack of adequate security and practice of not deleting personal information from its database – including...
37 KB (3,239 words) - 14:18, 26 May 2025
Hacker (category Hacking (computer security))
non-standard means. The term has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer...
41 KB (4,311 words) - 17:19, 14 June 2025
management that can be exploited by a malicious actor to compromise its security. Despite a system administrator's best efforts to achieve complete correctness...
27 KB (3,333 words) - 03:19, 9 June 2025
Script kiddie (category Hacking (computer security))
The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently...
6 KB (567 words) - 21:05, 16 June 2025
Keystroke logging (category Security breaches)
without knowing their positions. Use of smart cards or other security tokens may improve security against replay attacks in the face of a successful keylogging...
46 KB (5,283 words) - 09:53, 18 June 2025
Trojan horse (computing) (redirect from Trojan (computer security))
redirect targets Dancing pigs – Users' disregard for IT security Exploit (computer security) – Method of attack on computer systems Industrial espionage –...
19 KB (1,865 words) - 14:43, 18 April 2025
long-distance calls, as it was their own private equipment (not phone company security flaws) that allowed such fraud to occur. By 1993, call forwarding was offered...
36 KB (4,527 words) - 15:13, 16 June 2025
a quadrennial European convention Hackers on Planet Earth (HOPE) Security BSides, a community supported conference with locations across the globe Summercon...
52 KB (3,864 words) - 17:18, 10 June 2025
Grey hat (redirect from Gray hat (computer security))
A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually...
13 KB (1,505 words) - 20:01, 18 May 2025
Patrick Gray wrote that private security firms "secretly love" the group for the way in which it publicizes cyber security threats. Anonymous is sometimes...
174 KB (15,630 words) - 18:52, 28 May 2025
www.heraldsun.com.au. "BSides Tallinn's Best Of BSides 2021: BSides Perth 2021- Shain Lakin's 'Offensive RFID/NFC' – Security Boulevard". www.securityboulevard...
59 KB (6,123 words) - 21:31, 29 May 2025
Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine 2600: The Hacker Quarterly that until 2020 was typically...
29 KB (2,839 words) - 22:48, 30 May 2025
Malware (category Security breaches)
information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types...
76 KB (7,664 words) - 19:23, 5 June 2025
Infostealer (category Security breaches)
last year". CyberScoop. Retrieved 2025-04-22. "Infostealers Breach US Security Sector: Military, FBI Hit". Hackread. February 18, 2025. Retrieved 2025-05-22...
20 KB (2,253 words) - 06:20, 6 June 2025
Hacker Manifesto (category Hacking (computer security))
short essay written on March 18, 1986, by Loyd Blankenship, a computer security hacker who went by the handle The Mentor, and belonged to the second-generation...
6 KB (558 words) - 03:27, 24 May 2025
Hacker culture (category Hacking (computer security))
to security breakers, calling them "crackers" instead. This includes both "good" crackers ("white hat hackers"), who use their computer security-related...
48 KB (5,545 words) - 17:24, 6 June 2025
Briefings Chaos Communication Congress DEF CON Hackers on Planet Earth Security BSides ShmooCon Summercon Computer crime Crimeware List of computer criminals...
2 KB (170 words) - 16:01, 3 November 2024
Spyware (category Rogue security software)
harms the user by violating their privacy, endangering their device's security, or other means. This behavior may be present in other malware and in legitimate...
78 KB (8,732 words) - 21:22, 31 May 2025
Hyperjacking (category Computer security exploits)
malicious, fake hypervisor that can manage the entire server system. Regular security measures are ineffective because the operating system will not be aware...
7 KB (630 words) - 14:38, 27 August 2024
Namespace security is a digital security discipline that refers to the practices and technologies employed to protect the names and identifiers within...
9 KB (802 words) - 14:58, 13 April 2024
TCP sequence prediction attack (category Computer network security)
BackTrack Nmap Packet sniffer Snort Wireshark Bellovin, S.M. (1 April 1989). "Security Problems in the TCP/IP Protocol Suite". ACM SIGCOMM Computer Communication...
4 KB (483 words) - 15:53, 25 May 2025
applications are defensive in nature, and provide privacy, authentication, and security to users. Cryptovirology employs a twist on cryptography, showing that...
14 KB (1,458 words) - 07:19, 31 August 2024
In the context of information security, social engineering is the use of psychological influence of people into performing actions or divulging confidential...
35 KB (3,758 words) - 06:44, 2 June 2025
Briefings Chaos Communication Congress DEF CON Hackers on Planet Earth Security BSides ShmooCon Summercon Computer crime Crimeware List of computer criminals...
3 KB (275 words) - 13:04, 17 May 2025